You are currently viewing a new version of our website. To view the old version click .

156 Results Found

  • Article
  • Open Access
10 Citations
3,094 Views
15 Pages

11 October 2022

Smart health systems typically integrate sensor technology with the Internet of Things, enabling healthcare systems to monitor patients. These biomedical applications collect healthcare data through remote sensors and transfer the data to a centraliz...

  • Article
  • Open Access
6 Citations
2,413 Views
16 Pages

16 October 2021

Vinoth et al. proposed an authenticated key agreement scheme for industrial IoT (Internet of Things) applications. Vinoth et al.’s scheme aimed to protect the remote sensing data of industrial IoT devices under hostile environments. The scheme is int...

  • Article
  • Open Access
44 Citations
3,935 Views
22 Pages

SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

  • Mahmood A. Al-Shareeda,
  • Mohammed Anbar,
  • Selvakumar Manickam and
  • Iznan H. Hasbullah

8 December 2021

Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important. To...

  • Article
  • Open Access
4 Citations
3,493 Views
24 Pages

Secure Authentication in the Smart Grid

  • Mehdi Hosseinzadeh,
  • Rizwan Ali Naqvi,
  • Masoumeh Safkhani,
  • Lilia Tightiz and
  • Raja Majid Mehmood

29 December 2022

Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications. LLAKEP, an authenticated key agreeme...

  • Article
  • Open Access
3 Citations
1,063 Views
21 Pages

In a distributed wireless sensor network (DWSN), sensors continuously perceive the environment, collect data, and transmit it to remote users through the network so as to realize real-time monitoring of the environment or specific targets. However, g...

  • Article
  • Open Access
6 Citations
3,014 Views
17 Pages

17 November 2022

Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not requi...

  • Feature Paper
  • Article
  • Open Access
25 Citations
5,348 Views
22 Pages

Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication...

  • Article
  • Open Access
6 Citations
3,201 Views
16 Pages

Toward Designing a Secure Authentication Protocol for IoT Environments

  • Mehdi Hosseinzadeh,
  • Mazhar Hussain Malik,
  • Masoumeh Safkhani,
  • Nasour Bagheri,
  • Quynh Hoang Le,
  • Lilia Tightiz and
  • Amir H. Mosavi

29 March 2023

Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the desig...

  • Article
  • Open Access
777 Views
24 Pages

Impersonation attacks pose a significant threat to millimeter wave (mmWave) wireless systems due to the unique characteristics (e.g., highly directional beams) of mmWave communications. To this end, this paper proposes a novel physical layer authenti...

  • Article
  • Open Access
8 Citations
4,523 Views
21 Pages

20 July 2023

Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication...

  • Article
  • Open Access
34 Citations
6,753 Views
20 Pages

Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer

  • Mauro Tropea,
  • Mattia Giovanni Spina,
  • Floriano De Rango and
  • Antonio Francesco Gentile

Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in t...

  • Article
  • Open Access
10 Citations
4,570 Views
17 Pages

4 December 2022

Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Obser...

  • Article
  • Open Access
6 Citations
6,560 Views
19 Pages

An Improvement on Remote User Authentication Schemes Using Smart Cards

  • Chin-Ling Chen,
  • Yong-Yuan Deng,
  • Yung-Wen Tang,
  • Jung-Hsuan Chen and
  • Yu-Fan Lin

In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line passwor...

  • Article
  • Open Access
9 Citations
2,376 Views
9 Pages

Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States

  • Chun-Wei Yang,
  • Jason Lin,
  • Chia-Wei Tsai and
  • Ching-Lin Cheng

1 October 2022

Recently, Zhao et al. proposed a semi-quantum bi-signature (SQBS) scheme based on W states with two quantum signers and just one classical verifier. In this study, we highlight three security issues with Zhao et al.’s SQBS scheme. In Zhao et al...

  • Article
  • Open Access
8 Citations
2,210 Views
14 Pages

Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids

  • Masoumeh Safkhani,
  • Nasour Bagheri,
  • Saqib Ali,
  • Mazhar Hussain Malik,
  • Omed Hassan Ahmed,
  • Mehdi Hosseinzadeh and
  • Amir H. Mosavi

23 December 2022

Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the ability to clone them, for example. Device fingerprints, or Physical...

  • Article
  • Open Access
1,885 Views
12 Pages

An Efficient Identification Scheme Based on Bivariate Function Hard Problem

  • Boon Chian Tea,
  • Muhammad Rezal Kamel Ariffin,
  • Amir Hamzah Abd Ghafar,
  • Siti Hasana Sapar and
  • Mohamat Aidil Mohamat Johari

27 August 2022

Symmetric cryptography allows faster and more secure communication between two entities using the identical pre-established secret key. However, identifying the honest entity with the same secret key before initiating symmetric encryption is vital si...

  • Article
  • Open Access
72 Citations
7,129 Views
20 Pages

19 December 2017

As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networ...

  • Article
  • Open Access
5 Citations
9,018 Views
17 Pages

In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu–Zhu–Feng scheme and indicate many short...

  • Proceeding Paper
  • Open Access
4 Citations
5,159 Views
10 Pages

AI-Driven Vishing Attacks: A Practical Approach

  • Fabricio Toapanta,
  • Belén Rivadeneira,
  • Christian Tipantuña and
  • Danny Guamán

18 November 2024

Today, there are many security problems at the technological level, especially in telecommunications. Cybercriminals invade and steal data from any system using vector attacks such as phishing through scam mail, fake websites and phone calls. This la...

  • Essay
  • Open Access
1 Citations
1,901 Views
20 Pages

Task-Incremental Learning for Drone Pilot Identification Scheme

  • Liyao Han,
  • Xiangping Zhong and
  • Yanning Zhang

27 June 2023

With the maturity of Unmanned Aerial Vehicle (UAV) technology and the development of Industrial Internet of Things, drones have become an indispensable part of intelligent transportation systems. Due to the absence of an effective identification sche...

  • Article
  • Open Access
5 Citations
3,092 Views
20 Pages

Ransomware is one of the most extended cyberattacks. It consists of encrypting a user’s files or locking the smartphone in order to blackmail a victim. The attacking software is ordered on the infected device from the attacker’s remote se...

  • Article
  • Open Access
1,835 Views
27 Pages

5 August 2024

Remote data backup technology avoids the risk of data loss and tampering, and has higher security compared to local data backup solutions. However, the data transmission channel for remote data backup is not secure, and the backup server cannot be fu...

  • Article
  • Open Access
86 Citations
5,282 Views
24 Pages

25 April 2017

User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentic...

  • Article
  • Open Access
11 Citations
2,710 Views
17 Pages

Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT

  • Shunfang Hu,
  • Shaoping Jiang,
  • Qing Miao,
  • Fan Yang,
  • Weihong Zhou and
  • Peng Duan

10 April 2024

With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, mak...

  • Article
  • Open Access
40 Citations
6,117 Views
19 Pages

A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography

  • Guosheng Xu,
  • Shuming Qiu,
  • Haseeb Ahmad,
  • Guoai Xu,
  • Yanhui Guo,
  • Miao Zhang and
  • Hong Xu

23 July 2018

To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in multi-server environments, Internet of Things (IoT), wireless sensor networks (WSNs), etc. This scheme enables users and servers to negotiate for a com...

  • Article
  • Open Access
62 Citations
6,251 Views
25 Pages

Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments

  • JoonYoung Lee,
  • SungJin Yu,
  • KiSung Park,
  • YoHan Park and
  • YoungHo Park

22 May 2019

Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users. However, the wireless network is...

  • Article
  • Open Access
35 Citations
6,946 Views
38 Pages

30 October 2017

To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key establishment between...

  • Article
  • Open Access
57 Citations
6,913 Views
14 Pages

30 November 2015

Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes....

  • Article
  • Open Access
395 Views
25 Pages

16 October 2025

In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication. This protoc...

  • Article
  • Open Access
5 Citations
2,629 Views
20 Pages

In quantum secure multi-party summation protocols, some attackers can impersonate legitimate participants in the summation process, and easily steal the summation results from the participants. This is often overlooked for existing secure multi-party...

  • Article
  • Open Access
4 Citations
2,071 Views
24 Pages

In the process of vehicles transitioning from conventional means of transportation to mobile computing platforms, ensuring secure communication and data exchange is of paramount importance. Consequently, identity authentication has emerged as a cruci...

  • Article
  • Open Access
2 Citations
1,416 Views
19 Pages

8 March 2024

In the advanced metering infrastructure (AMI), impersonation, eavesdropping, man-in-the-middle and other attacks occur in the process of communication between entities through public channels, which will lead to the leakage of user privacy or the inc...

  • Article
  • Open Access
51 Citations
5,247 Views
15 Pages

An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones

  • Sana Javed,
  • Muhammad Asghar Khan,
  • Ako Muhammad Abdullah,
  • Amjad Alsirhani,
  • Abdullah Alomari,
  • Fazal Noor and
  • Insaf Ullah

20 September 2022

The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drones, on the o...

  • Article
  • Open Access
3 Citations
1,792 Views
24 Pages

28 March 2025

Cross-domain authentication of drones has played an important role in emergency rescue, collaborative missions, and so on. However, the existing cross-domain authentication protocols for drones may cause privacy leakages and stolen-verifier attacks d...

  • Article
  • Open Access
1 Citations
3,693 Views
17 Pages

Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems

  • Benoit Vibert,
  • Jean-Marie Le Bars,
  • Christophe Charrier and
  • Christophe Rosenberger

21 September 2020

Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric re...

  • Article
  • Open Access
48 Citations
3,881 Views
17 Pages

18 January 2023

The Internet of Medical Things (IoMT) is used in the medical ecosystem through medical IoT sensors, such as blood glucose, heart rate, temperature, and pulse sensors. To maintain a secure sensor network and a stable IoMT environment, it is important...

  • Article
  • Open Access
3 Citations
2,763 Views
20 Pages

Threat Detection Model for WLAN of Simulated Data Using Deep Convolutional Neural Network

  • Omar I. Dallal Bashi,
  • Shymaa Mohammed Jameel,
  • Yasir Mahmood Al Kubaisi,
  • Husamuldeen K. Hameed and
  • Ahmad H. Sabry

23 October 2023

Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can b...

  • Feature Paper
  • Article
  • Open Access
75 Citations
5,230 Views
15 Pages

2 July 2018

The advancement of Wireless Body Area Networks (WBAN) have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or he...

  • Article
  • Open Access
3 Citations
1,783 Views
12 Pages

29 July 2024

To address the potential threat to the power grid industry posed by quantum computers and ensure the security of bidirectional communication in smart grids, it is imperative to develop quantum-safe authentication protocols. This paper proposes a semi...

  • Article
  • Open Access
5 Citations
4,059 Views
14 Pages

Securing the Insecure: A First-Line-of-Defense for Body-Centric Nanoscale Communication Systems Operating in THz Band

  • Waqas Aman,
  • Muhammad Mahboob Ur Rahman,
  • Hasan T. Abbas,
  • Muhammad Arslan Khalid,
  • Muhammad A. Imran,
  • Akram Alomainy and
  • Qammer H. Abbasi

19 May 2021

This manuscript presents a novel mechanism (at the physical layer) for authentication and transmitter identification in a body-centric nanoscale communication system operating in the terahertz (THz) band. The unique characteristics of the propagation...

  • Article
  • Open Access
2 Citations
661 Views
22 Pages

28 March 2025

We conduct a cryptanalysis of the Vehicle-to-Infrastructure (V2I) handover authentication protocol newly developed by Son et al., which incorporates blockchain technology for authentication purposes. Although this approach is notably efficient, our a...

  • Article
  • Open Access
86 Citations
8,161 Views
20 Pages

9 April 2014

User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have be...

  • Article
  • Open Access
12 Citations
7,796 Views
29 Pages

Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks

  • Ren-Hung Hwang,
  • Jia-You Lin,
  • Sun-Ying Hsieh,
  • Hsuan-Yu Lin and
  • Chia-Liang Lin

11 January 2023

Deep learning technology has developed rapidly in recent years and has been successfully applied in many fields, including face recognition. Face recognition is used in many scenarios nowadays, including security control systems, access control manag...

  • Article
  • Open Access
102 Citations
8,556 Views
27 Pages

Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET

  • Adnan Shahid Khan,
  • Kuhanraj Balan,
  • Yasir Javed,
  • Seleviawati Tarmizi and
  • Johari Abdullah

14 November 2019

Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ensures timely and accurate communications between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) to improve road safety and enhance the effic...

  • Article
  • Open Access
21 Citations
4,541 Views
27 Pages

Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards

  • Anuj Kumar Singh,
  • Arun Solanki,
  • Anand Nayyar and
  • Basit Qureshi

23 November 2020

In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective des...

  • Article
  • Open Access
10 Citations
2,103 Views
25 Pages

Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts

  • Keunok Kim,
  • Jihyeon Ryu,
  • Hakjun Lee,
  • Youngsook Lee and
  • Dongho Won

Federated authentication, such as Google ID, enables users to conveniently access multiple websites using a single login credential. Despite this convenience, securing federated authentication services requires addressing a single point of failure, w...

  • Article
  • Open Access
22 Citations
4,922 Views
16 Pages

Fusion of Neuro-Signals and Dynamic Signatures for Person Authentication

  • Pradeep Kumar,
  • Rajkumar Saini,
  • Barjinder Kaur,
  • Partha Pratim Roy and
  • Erik Scheme

28 October 2019

Many biometric systems based on physiological traits such as ones facial characteristics, iris, and fingerprint have been developed for authentication purposes. Such security systems, however, commonly suffer from impersonation attacks such as obfusc...

  • Article
  • Open Access
30 Citations
4,559 Views
16 Pages

Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks

  • Jihyeon Ryu,
  • Hakjun Lee,
  • Hyoungshick Kim and
  • Dongho Won

18 December 2018

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networ...

  • Article
  • Open Access
5 Citations
3,752 Views
11 Pages

Replay Attack Detection Based on High Frequency Missing Spectrum

  • Junming Yuan,
  • Mijit Ablimit and
  • Askar Hamdulla

22 December 2022

Automatic Speaker Verification (ASV) has its benefits compared to other biometric verification methods, such as face recognition. It is convenient, low cost, and more privacy protected, so it can start being used for various practical applications. H...

  • Article
  • Open Access
1 Citations
2,351 Views
13 Pages

A Secure Authentication Scheme for Teleservices Using Multi-Server Architecture

  • Sachin Kumar,
  • Kadambri Agarwal,
  • Amit Kumar Gupta,
  • Saru Kumari and
  • Mangal Sain

8 September 2022

The telecommunications industry covers various sectors and services such as broadband, telecom equipment, telecom infrastructure, telephone service providers, mobile virtual network operators, 5G, and the white space spectrum. Smart Cards may be chos...

of 4